Search for "Shane" returned 1222 results

60 min
From Computation to Consciousness
How computation helps to explain mind, universe and…

61 min
Safe and Secure Drivers in High-Level Languages
How to write PCIe drivers in Rust, go, C#, Swift, Haskell,…

58 min
Glitching For n00bs
A Journey to Coax Out Chips' Inner Secrets

44 min
What the cyberoptimists got wrong - and what to do about it
Tech unexeptionalism and the monopolization of every…

60 min
The rise and fall of Internet voting in Norway
Evaluating a complex cryptographic implementation

64 min
"Exploit" in theater
post-existentialism is the question, not post-privacy

57 min
Kryptographie nach Snowden
Was tun nach der mittelmäßigen Kryptographie-Apokalypse?

55 min
The Gospel of IRMA
Attribute Based Credentials in Practice

60 min
Glass Hacks
Fun and frightening uses of always-on camera enabled…

64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy

60 min
Are machines feminine?
exploring the relations between design and perception of…

51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system

63 min
The Global Assassination Grid
The Infrastructure and People behind Drone Killings

51 min
Ecuador: how an authoritarian government is fooling the entire world
Guess what? The Government of Rafael Correa actually is…

49 min
Toward a Cognitive "Quantified Self"
Activity Recognition for the Mind

61 min